๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŒ Character Sets

Encoding History, EBCDIC, ASCII Evolution, Internationalization

GenAI, Education, and Crisis Situations
cacm.acm.orgยท4h
๐Ÿ—บ๏ธCompetency Maps
I am no longer chairing defenses or joining committees where students use generative AI for their writing
statmodeling.stat.columbia.eduยท3h
โšกProof Automation
Celebrating the Outstanding Cultural & Heritage Professionals making Open Access Possible
diff.wikimedia.orgยท7h
๐Ÿ›Digital humanities
Risky Bulletin: Microsoft blocks filesystem redirection attacks in new security feature
news.risky.bizยท2d
๐Ÿ”“Hacking
Luckfox Lyra Pi with Core3506 SoC Provides Optional 4G and PoE in a Raspberry Pi-Sized Form Factor
linuxgizmos.comยท8hยท
Discuss: Hacker News
๐Ÿ”ŒSingle Board PC
Gradual negation types and the Python type system
jellezijlstra.github.ioยท1dยท
Discuss: Hacker News
๐Ÿ”ฌRefinement Types
Reverse Engineering the Miele Diagnostic Interface
medusalix.github.ioยท1dยท
Discuss: Hacker News
โš™๏ธCassette Mechanics
Original Xbox Hacks: The A20 CPU Gate
connortumbleson.comยท1dยท
Discuss: Hacker News
๐ŸงฒRISC-V Archaeology
RNNoise: Learning Noise Suppression
jmvalin.caยท15hยท
Discuss: Hacker News
๐ŸŽงLearned Audio
Chinese state-sponsored cyberattacks target Taiwan semiconductor industry โ€” security firm says motivation of three separate campaigns 'most likely espionage'
tomshardware.comยท10h
๐Ÿ‡จ๐Ÿ‡ณChinese Computing
An analysis of +671k works of fan fiction finds that attraction follows a U shaped curve with the highest peak at "familiarity", while enjoyment follows an inve...
nature.comยท17hยท
Discuss: Hacker News
๐ŸฐManuscript Networks
Why Teams Are Ditching DynamoDB
hackernoon.comยท2d
๐Ÿ”„Sync Engine
Code Smells in Clojure
github.comยท1dยท
Discuss: Hacker News
๐Ÿฆ€Rust Borrowing
๐Ÿง  Generate JSON from Plain English โ€” Free AI Tool for Developers
dev.toยท17hยท
Discuss: DEV
โš™๏ธParser Generators
Ransomware gang attacking NAS devices taken down in major police operation
techradar.comยท11h
๐ŸŽซKerberos Attacks
Setting up proper documentation with Sphinx docs โ€” Building stocksimpy 1
dev.toยท2hยท
Discuss: DEV
โšกProof Automation
How a 12% Tax Rule Becomes Code: Grammar, Law, and Machine Execution
dev.toยท2dยท
Discuss: DEV
๐Ÿ“Concrete Syntax
A Discrete Analog of Tutte's Barycentric Embeddings on Surfaces
arxiv.orgยท18h
๐ŸŒComputational Topology
When Pattern-by-Pattern Works: Theoretical and Empirical Insights for Logistic Models with Missing Values
arxiv.orgยท18h
๐ŸงฎKolmogorov Complexity
More reliable bioinformatics tools for the study of proteins
phys.orgยท8h
๐ŸงฌCopy Number Variants
Loading...Loading more...
AboutBlogChangelogRoadmap